References
- Gray , R.S. , Kotz , D. , Cybenko , G. and Rus , D. 2000 . Mobile agents: Motivations and state-of-the-art systems . Dartmouth , : TR2000 – TR2365 .
- Samarati , P. and Vimercati , S.D. 2001 . “ Access control: Policies, models, and mechanisms ” . In Revised Versions of Lectures Given During the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures , Lecture Notes In Computer Science Vol. 2171 , 137 – 196 . London : Springer-Verlag .
- Yang , K. , Guo , X. and Liu , D. 2000 . “ Security in mobile agent system: Problems and approaches ” . In SIGOPS Operating System Review , Vol. 34 , 21 – 22 . New York, NY : ACM Press . No. 1
- Li , X. , Lu , J. , Cao , C. , Feng , X. and Tao , X. 2000 . Research on security in mobile agent system . Journal of Software , 13 ( 10 ) : 1991 – 1999 .
- Jansen , W. 2001 . “ Determining privileges of mobile agents ” . In Proceedings of the 17th Annual Computer Security Applications Conference, ACSAC , 149 Washington, DC : IEEE Computer Society .
- Jansen , W. 2000 . Countermeasures for mobile agent security . Computer Communications , 23 ( 10 ) : 1667 – 1677 .
- Tripathi , A. and Karnik , N. 1998 . “ Protected resource access for mobile agent-based distributed computing ” . In Proceedings of the 1998 International Conference on Parallel Processing Workshops, ICPPW , 144 Washington, DC : IEEE Computer Society .
- Maggi , P. and Sisto , R. 2003 . “ A configurable mobile agent data protection protocol ” . In Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems 851 – 858 .
- Xu , C. and Fu , S. 2003 . “ Privilege delegation and agent-oriented access control in Naplet ” . In Proceedings of the 23rd International Conference on Distributed Computing Systems, ICDCSW , 493 – 497 . Washington, DC : IEEE Computer Society .
- Xu , C. 2005 . “ Naplet: A mobile agent approach ” . In Scalable and Secure Internet Services and Architecture , 219 – 246 . Boca Raton, FL : CRC Press .
- Sonntag , M. and Hörmanseder , R. 2000 . “ Mobile agent security based on payment ” . In SIGOPS Operating System Review , Vol. 34 , 48 – 55 . New York, NY : ACM Press . No. 4
- Cao , C. , Zheng , W. , Lü , J. and Tao , X. 2003 . Defense against DoS attack in Mogent system . Mini-Micro Systems , 24 ( 12 ) : 2070 – 2207 .
- Zhang , G. and Parashar , M. 2004 . “ Context-aware dynamic access control for pervasive applications ” . In Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference
- Covington , M.J. 2001 . “ Securing context-aware applications using environment roles ” . In Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
- Roth , V. 1998 . “ Secure recording of itineraries through co-operating agents ” . In Workshop Ion on Object-Oriented Technology , Lecture Notes In Computer Science vol. 1543 , 297 – 298 . London : Springer-Verlag .
- Ferraiolo , D. , Sandhu , R. and Gavrila , S. 2001 . Proposed NIST standard for role-based access control . ACM Transactions on Information and System Security , 4 ( 3 ) : 224 – 274 .
- Ordille , J. 1996 . “ When agents roam, who can you trust? ” . In Proceedings of Emerging Technologies and Applications in Communications Portland
- Dimmock , N. and Belokosztolszki , A. 2004 . “ Using trust and risk in role-based access control policies ” . In Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies 156 – 162 .
- Bertino , E. , Bonatti , P. and Ferrari , E. 2001 . TRBAC: A temporal role-based access control model . ACM Transactions on Information and System Security , 4 ( 3 ) : 191 – 233 .